-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
404 Error when using Azure as OIDC Provider #12535
Comments
UPDATE: just stumbled upon this issue. I tried all the "Endpoints" in Azure Portal -> Azure AD -> App Registrations -> Endpoints, including IMO, |
Hi, this is opinionated, but this has been documented and we don't want to introduce such break change. |
The When looking at other OIDC providers' docs, they give this URI as well (ie. Auth0, Swagger). This Discovery Endpoint returns important information regarding the interaction of OIDC Provider and could help automate some of the fields needed to configure it (ie. |
Actually Harbor DOES rely on the discovery URI to get information. The expected value of the |
I see. So the code is doing something like Wouldn't it make sense to just allow the full URI as a valid input? Maybe check if the suffix |
This may help, but I don't think most users will consider the |
I'll keep this open if there are more users hitting the same issue we may consider make this improvement. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
I cannot find it here. Is there anywhere else that it's expected to be documented? |
Just hit this as well, and the logging is confusing because the value I provided for the endpoint definitely doesn't 404 for me. IMO this needs to be documented better. Since the UI doesn't have separate fields for each of the individual oidc endpoints, then I think most users are going to assume that the "OIDC endpoint" is the well-known uri.
|
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
I think this issue should not be closed until there's at least better documentation. |
This issue is being marked stale due to a period of inactivity. If this issue is still relevant, please comment or remove the stale label. Otherwise, this issue will close in 30 days. |
This issue was closed because it has been stalled for 30 days with no activity. If this issue is still relevant, please re-open a new issue. |
Chipping in to feedback that I encountered the same issue as well when using Azure AD as IDP. |
Issue
When configuring Authentication to use OIDC as the "Auth Mode" and using Azure as the Provider, the UI is giving the error "failed to verify connection" and the logs give:
OIDC Configuration:
Auth Mode: OIDC
OIDC Provider Name: Azure
OIDC Endpoint: https://login.microsoftonline.com/{tenant_id}/oauth2/v2.0/authorize
OIDC Client ID: <azure_appreg_client_id>
OIDC Client Secret: <azure_appreg_client_secret>
Group Claim Name: blank
OIDC Scope: openid,offline_access,email
Verify Certificate: checked
Azure App Registration Configuration:
Redirect URI: https://harbor.my.fqdn.com/c/oidc/callback
Implicit grant:
ID tokens
checkedSupported account types: Accounts in this organizational directory only
API Permissions:
Followed Docs:
Azure AD OIDC Protocol here
Consent Scopes here
Configure App Registration here & here
Environment
Kubernetes:
v1.17.7
Harbor:
v2.0.1
OIDC Provider:
Azure
Deployment: Helm Chart
v1.4.1
The text was updated successfully, but these errors were encountered: